Vulnerability Description
A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Email Security Appliance | 9.7.1-066 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/93909
- http://www.securitytracker.com/id/1037114
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
- http://www.securityfocus.com/bid/93909
- http://www.securitytracker.com/id/1037114
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
FAQ
What is CVE-2016-6357?
CVE-2016-6357 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass...
How severe is CVE-2016-6357?
CVE-2016-6357 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-6357?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Email Security Appliance.